Loading...
Browse 20 splunk tools
Splunk app for federated natural language search across distributed security data sources.
Extends Splunk visibility via federated search across external data sources.
Managed SOAR service built on Splunk for orchestration, automation & response.
Splunk-powered SOC-as-a-Service with 24/7 managed security operations.
Managed Splunk admin, monitoring, and SOC services by a Splunk MSSP.
Zeek-based network traffic analysis & IDS platform for enterprise deployments.
ABAC-based data security & access control for Microsoft 365 & SharePoint.
Splunk consulting services for deployment optimization and configuration
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.
Tango is a set of scripts and Splunk apps for deploying honeypots with ease.
An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.
Curated datasets for developing and testing detections in SIEM installations.
A pre-indexed Splunk security dataset and CTF platform that provides realistic security data for training, research, and educational purposes for cybersecurity professionals and students.
Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.
Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.
Access a repository of Analytic Stories and security guides mapped to industry frameworks, with Splunk searches, machine learning algorithms, and playbooks for threat detection and response.
Get strategic cybersecurity insights in your inbox